Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Document how to secure the Capsule environment with PSP #5

Closed
prometherion opened this issue Jul 24, 2020 · 2 comments
Closed

Document how to secure the Capsule environment with PSP #5

prometherion opened this issue Jul 24, 2020 · 2 comments
Assignees
Labels
documentation Improvements or additions to documentation

Comments

@prometherion
Copy link
Member

Making a CaaS platform means Tenant owner Pods could run on the same node: an attacker could start a privileged one, getting root access on the machine, and obtain privilege escalation.

A document explaining how to set up a simple Pod Security Policy would be great, explaining why a Cluster Admin should deny getting Pods running as privileged, denying to perform host mounting, or host using the host network, etc.

I'm pretty confident that Capsule is not responsible to set this up and must be performed by the Cluster Admin, rather.

@prometherion prometherion added the documentation Improvements or additions to documentation label Jul 24, 2020
@bsctl bsctl self-assigned this Jul 30, 2020
@bsctl
Copy link
Member

bsctl commented Aug 11, 2020

@prometherion just started to address this issue. Following kubernetes guidelines we should assign the SA in the capsule-system namespace the RBAC to use a permissive PSP. This could be a pre-requisite for example before to install Capsule in a PSP-enabled cluster.

For what concerns tenants, we should consider the option to add a new section in the tenant manifest in order to assign a specific PSP to the tenant. Each namespace inherits the PSP grant from the tenant. It's likely that in a multi-tenant user we want to use different PSP for different tenants. See #52

@bsctl
Copy link
Member

bsctl commented Sep 2, 2020

PodSecurityPolicies for Capsule Operator can be enabled when installing Capsule with its helm chart https://github.com/clastix/capsule-helm-chart. It is documented into the chart.

@bsctl bsctl closed this as completed Sep 2, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Improvements or additions to documentation
Projects
None yet
Development

No branches or pull requests

2 participants